City: unknown
Region: unknown
Country: United States of America (the)
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 15.129.193.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30689
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;15.129.193.142. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400
;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:21:04 CST 2025
;; MSG SIZE rcvd: 107
Host 142.193.129.15.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 142.193.129.15.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 178.128.168.87 | attack | sshd jail - ssh hack attempt |
2020-04-18 20:34:03 |
| 222.186.175.148 | attackspam | Apr 18 14:12:41 santamaria sshd\[25621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148 user=root Apr 18 14:12:42 santamaria sshd\[25621\]: Failed password for root from 222.186.175.148 port 31896 ssh2 Apr 18 14:12:53 santamaria sshd\[25621\]: Failed password for root from 222.186.175.148 port 31896 ssh2 ... |
2020-04-18 20:31:37 |
| 104.251.231.80 | attackbotsspam | Apr 18 16:47:33 gw1 sshd[28343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.251.231.80 Apr 18 16:47:36 gw1 sshd[28343]: Failed password for invalid user hadoopuser from 104.251.231.80 port 44416 ssh2 ... |
2020-04-18 20:03:42 |
| 222.99.52.216 | attack | (sshd) Failed SSH login from 222.99.52.216 (-): 5 in the last 3600 secs |
2020-04-18 20:22:24 |
| 148.72.213.105 | attackspam | 148.72.213.105 - - [18/Apr/2020:14:03:00 +0200] "GET /wp-login.php HTTP/1.1" 200 6463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 148.72.213.105 - - [18/Apr/2020:14:03:03 +0200] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" 148.72.213.105 - - [18/Apr/2020:14:03:04 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" |
2020-04-18 20:13:17 |
| 115.223.159.138 | attack | Apr 18 21:40:40 our-server-hostname postfix/smtpd[312]: connect from unknown[115.223.159.138] Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x Apr x@x ........ ----------------------------------------------- https://www.blocklist.de/en/view.html?ip=115.223.159.138 |
2020-04-18 20:10:14 |
| 45.227.255.190 | attack | TCP Port Scanning |
2020-04-18 19:58:28 |
| 196.44.191.3 | attack | Apr 18 12:03:18 *** sshd[10638]: Invalid user qn from 196.44.191.3 |
2020-04-18 20:09:30 |
| 5.249.145.245 | attackbotsspam | Apr 18 14:02:30 vpn01 sshd[27128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.145.245 Apr 18 14:02:32 vpn01 sshd[27128]: Failed password for invalid user ubuntu from 5.249.145.245 port 46924 ssh2 ... |
2020-04-18 20:43:49 |
| 151.41.147.194 | attackspam | trying to access non-authorized port |
2020-04-18 20:12:55 |
| 180.183.245.122 | attack | Disconnected \(auth failed, 1 attempts in 13 secs\): |
2020-04-18 20:15:58 |
| 31.124.43.68 | attackspam | firewall-block, port(s): 23/tcp |
2020-04-18 20:02:16 |
| 51.91.111.73 | attackspambots | 2020-04-17 UTC: (20x) - admin(3x),admin1,os,qn,root(10x),ry,tc,ubuntu(2x) |
2020-04-18 20:00:48 |
| 131.108.60.30 | attackspam | Apr 18 14:02:58 |
2020-04-18 20:16:42 |
| 93.174.95.106 | attackspambots | Unauthorized connection attempt detected from IP address 93.174.95.106 to port 503 |
2020-04-18 20:20:37 |